Research Papers - Dept of Computer Systems Engineering
Permanent URI for this collection https://rda.sliit.lk/handle/123456789/1253
Browse
2 results
Search Results
Publication Embargo Privacy & Security in Mobile Devices, Social Network Services as Related to Business(IEEE, 2018-06-14) Harshanath, S. M. BuddhikaMobile computing has made it extra easy to maintain contacts either away from home or office. These mobile computing devices are mostly meant to increase productivity in the place of work. Yet, the benefits can easily come along with a good amount of risks too. Business operations require human resources and systems and we cannot do without them in our business operations. Therefore, it is time for professionals engaged in security tasks to consider challenges to information security before considering awareness programs for workers to treat information security as a highly valuable attribute. These awareness raising programs could create attitudinal changes towards risk management with regular use of mobile devices. But, of course, rules and regulations require time to come into effect. Self-awareness brought in with attitudinal changes, takes no time. Nowadays, with the IoT (Internet of Things) it is possible to monitor use of mobile devices, moving around buildings and automobiles. This, in turn, demands robust security systems.Publication Embargo Privacy & Security in Mobile Devices, Social Network Services and Social Reform(ttest, 2018-04) Harshanath, S. M. BuddhikaMobile computing devices and social networks have become very popular for contact away from home or in the office. Though meant for increased productivity in the workplace, the benefits are not without risks. Human resources and systems are recognized as essential to society and business operations. Challenges to information security professionals require, first of all, convincing management about the problem and then considering awareness programs for the workforce to inculcate information security as a highly valued attribute. Such awareness raising could be developed to transform attitudinal changes to follow risk management procedures for regular use with the use of mobile devices. Rules and restrictions take time to materialize. Self-control from an individual made aware of the risks takes no time. Now, with the Internet of Things (IoT) it is possible for various devices to hover around mobile users and make use of control features in buildings and automobiles as well. This makes the demand for robust security systems to ward off attacks, essential
